• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 18,597
Next 10 →

Real-Time Dynamic Voltage Scaling for Low-Power Embedded Operating Systems

by Padmanabhan Pillai, Kang G. Shin , 2001
"... In recent years, there has been a rapid and wide spread of nontraditional computing platforms, especially mobile and portable computing devices. As applications become increasingly sophisticated and processing power increases, the most serious limitation on these devices is the available battery lif ..."
Abstract - Cited by 501 (4 self) - Add to MetaCart
the necessary peak computation power in general-purpose systems. However, for a large class of applications in embedded real-time systems like cellular phones and camcorders, the variable operating frequency interferes with their deadline guarantee mechanisms, and DVS in this context, despite its growing

Similarity Flooding: A Versatile Graph Matching Algorithm and Its Application to Schema Matching

by Sergey Melnik, Hector Garcia-molina, Erhard Rahm , 2002
"... Matching elements of two data schemas or two data instances plays a key role in data warehousing, e-business, or even biochemical applications. In this paper we present a matching algorithm based on a fixpoint computation that is usable across different scenarios. The algorithm takes two graphs (sch ..."
Abstract - Cited by 592 (12 self) - Add to MetaCart
(schemas, catalogs, or other data structures) as input, and produces as output a mapping between corresponding nodes of the graphs. Depending on the matching goal, a subset of the mapping is chosen using filters. After our algorithm runs, we expect a human to check and if necessary adjust the results. As a

Dynamic source routing in ad hoc wireless networks

by David B. Johnson, David A. Maltz - Mobile Computing , 1996
"... An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration. In such an environment, it may be necessary for one mobile host to enlist the aid of other hosts in forwarding a packet to its desti ..."
Abstract - Cited by 3108 (31 self) - Add to MetaCart
An ad hoc network is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration. In such an environment, it may be necessary for one mobile host to enlist the aid of other hosts in forwarding a packet to its

Tor: The secondgeneration onion router,”

by Roger Dingledine - in 13th USENIX Security Symposium. Usenix, , 2004
"... Abstract We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, an ..."
Abstract - Cited by 1229 (33 self) - Add to MetaCart
are deleted, subsequently compromised nodes cannot decrypt old traffic. As a side benefit, onion replay detection is no longer necessary, and the process of building circuits is more reliable, since the initiator knows when a hop fails and can then try extending to a new node. Separation of "

PREOPERATIVE PLANNING Doing the Correct (and Necessary) Operation

by unknown authors
"... Throughout this book the emphasis is on specific detailsof operative techniques in hand surgery. The purpose of thisintroductory chapter is to briefly discuss some of the ele-ments that are common to all operations on the hand. The scope of hand surgery is broad and requires a wide range of diverse ..."
Abstract - Add to MetaCart
Throughout this book the emphasis is on specific detailsof operative techniques in hand surgery. The purpose of thisintroductory chapter is to briefly discuss some of the ele-ments that are common to all operations on the hand. The scope of hand surgery is broad and requires a wide range of diverse

ASCENT: Adaptive self-configuring sensor networks topologies

by Alberto Cerpa, Deborah Estrin , 2004
"... Advances in microsensor and radio technology will enable small but smart sensors to be deployed for a wide range of environmental monitoring applications. The low per-node cost will allow these wireless networks of sensors and actuators to be densely distributed. The nodes in these dense networks w ..."
Abstract - Cited by 449 (15 self) - Add to MetaCart
are necessary to establish a routing forwarding backbone. In ASCENT, each node assesses its connectivity and adapts its participation in the multihop network topology based on the measured operating region. This paper motivates and describes the ASCENT algorithm and presents analysis, simulation

Storage and executive processes in the frontal lobes.

by Edward E Smith , John Jonides - Science, , 1999
"... The human frontal cortex helps mediate working memory, a system that is used for temporary storage and manipulation of information and that is involved in many higher cognitive functions. Working memory includes two components: short-term storage (on the order of seconds) and executive processes th ..."
Abstract - Cited by 401 (5 self) - Add to MetaCart
that operate on the contents of storage. Recently, these two components have been investigated in functional neuroimaging studies. Studies of storage indicate that different frontal regions are activated for different kinds of information: storage for verbal materials activates Broca's area and left

Machine learning for high-speed corner detection

by Edward Rosten, Tom Drummond - In European Conference on Computer Vision , 2006
"... Where feature points are used in real-time frame-rate applications, a high-speed feature detector is necessary. Feature detectors such as SIFT (DoG), Harris and SUSAN are good methods which yield high quality features, however they are too computationally intensive for use in real-time applicati ..."
Abstract - Cited by 353 (4 self) - Add to MetaCart
Where feature points are used in real-time frame-rate applications, a high-speed feature detector is necessary. Feature detectors such as SIFT (DoG), Harris and SUSAN are good methods which yield high quality features, however they are too computationally intensive for use in real

Make: a program for maintaining computer programs.

by S I Feldman - Softw: Pract. Exper., , 1979
"... ABSTRACT In a programming project, it is easy to lose track of which files need to be reprocessed or recompiled after a change is made in some part of the source. Make provides a simple mechanism for maintaining up-to-date versions of programs that result from many operations on a number of files. ..."
Abstract - Cited by 352 (0 self) - Add to MetaCart
ABSTRACT In a programming project, it is easy to lose track of which files need to be reprocessed or recompiled after a change is made in some part of the source. Make provides a simple mechanism for maintaining up-to-date versions of programs that result from many operations on a number of files

PEAS: A Robust Energy Conserving Protocol for Long-lived Sensor Networks

by Fan Ye, Gary Zhong, Jesse Cheng, Songwu Lu, Lixia Zhang , 2003
"... In this paper we present PEAS, a robust energyconserving protocol that can build long-lived, resilient sensor networks using a very large number of small sensors with short battery lifetime. PEAS extends the network lifetime by maintaining a necessary set of working nodes and turning o redundant one ..."
Abstract - Cited by 349 (5 self) - Add to MetaCart
In this paper we present PEAS, a robust energyconserving protocol that can build long-lived, resilient sensor networks using a very large number of small sensors with short battery lifetime. PEAS extends the network lifetime by maintaining a necessary set of working nodes and turning o redundant
Next 10 →
Results 1 - 10 of 18,597
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University